Security + Cryptography

30 Questions | Total Attempts: 1447

SettingsSettingsSettings
Please wait...
Cryptography Quizzes & Trivia

CRYPTOGRAPHY


Questions and Answers
  • 1. 
    Which of the following is not one of the three main categories of cryptography?
    • A. 

      Steganography

    • B. 

      Physical

    • C. 

      Mathematical

    • D. 

      Quantum

  • 2. 
    Which type of cipher is a simple coding system that changes one character or symbol into another?
    • A. 

      Reverseography

    • B. 

      Steganography

    • C. 

      Transposition

    • D. 

      Substitution

  • 3. 
    Which of the following is a hexadecimal value that is computed to verify authenticity?
    • A. 

      Mince

    • B. 

      Checksum

    • C. 

      Denomination

    • D. 

      Integer

  • 4. 
    If security is a real concern on your network, what length do most experts recommend as the minimum for password length?
    • A. 

      10

    • B. 

      9

    • C. 

      8

    • D. 

      6

  • 5. 
    Which of the following involves looking at blocks of an encrypted message to determine whether any common patterns exist?
    • A. 

      Quantum cryptography

    • B. 

      Algorithm errors

    • C. 

      Frequency analysis

    • D. 

      Brute-force attacks

  • 6. 
    Which of the following is the process of converting a message into a numeric value?
    • A. 

      Hashing

    • B. 

      Digitizing

    • C. 

      Conversion

    • D. 

      Reassignment

  • 7. 
    Which of the following is not one of the three most common versions of Message Digest Algorithm (MDA)?
    • A. 

      MD2

    • B. 

      MD3

    • C. 

      MD4

    • D. 

      MD5

  • 8. 
    Which of the following is an update to Secure Hash Algorithm (SHA)?
    • A. 

      SHA-1

    • B. 

      SHA2

    • C. 

      SHB

    • D. 

      SHAA

  • 9. 
    What bit hash value does Secure Hash Algorithm (SHA) produce?
    • A. 

      96

    • B. 

      128

    • C. 

      160

    • D. 

      256

  • 10. 
    What bit hash value does MD5 produce?
    • A. 

      96

    • B. 

      128

    • C. 

      160

    • D. 

      256

  • 11. 
    Symmetric algorithm encryption methods use either of which two ciphers? (Choose two.)
    • A. 

      Block

    • B. 

      Stream

    • C. 

      Character

    • D. 

      Bit

  • 12. 
    Which type of cipher involves the hiding of one message within another?
    • A. 

      Reverseography

    • B. 

      Steganography

    • C. 

      Transposition

    • D. 

      Substitution

  • 13. 
    Which of the following was developed by a Swiss consortium and uses a 128-bit algorithm key for symmetric encryption?
    • A. 

      IDEA

    • B. 

      CAST

    • C. 

      Blowfish

    • D. 

      RC5

  • 14. 
    Which of the following is an asymmetric algorithm based on calculating logarithms?
    • A. 

      ECC

    • B. 

      Diffie-Hellman

    • C. 

      El Gamal

    • D. 

      RSA

  • 15. 
    Which of the following is derived from the message and a key and is used to verify the integrity of a message?
    • A. 

      MAC

    • B. 

      BDC

    • C. 

      ERC

    • D. 

      CDC

  • 16. 
    Which of the following is not a key component of PKI?
    • A. 

      CA

    • B. 

      LRB

    • C. 

      RSA

    • D. 

      RA

  • 17. 
    Which is named after the creators and uses a 40-bit to 128-bit key for symmetric encryption?
    • A. 

      IDEA

    • B. 

      CAST

    • C. 

      Blowfish

    • D. 

      RC5

  • 18. 
    Which of the following is a form of encryption based on the characteristics of the smallest particles known?
    • A. 

      Quantum cryptography

    • B. 

      Algorithm errors

    • C. 

      Frequency analysis

    • D. 

      Brute-force attacks

  • 19. 
    What is the primary difference between an RA and LRA?
    • A. 

      The LRA saves the CA from responding to so much traffic.

    • B. 

      The LRA can route requests to more than one CA.

    • C. 

      The LRA can be used to identify or establish the identity of an individual.

    • D. 

      The LRA is available only on the LAN, while the CA is available on the WAN.

  • 20. 
    What is the most popular version of X.509?
    • A. 

      Version 5

    • B. 

      Version 3

    • C. 

      Version 2

    • D. 

      Version 1

  • 21. 
    Which of the following is a statement that the CA uses to issue certificates and implement the policies of the CA?
    • A. 

      CTP

    • B. 

      CRL

    • C. 

      CPS

    • D. 

      CNS

  • 22. 
    Which of the following is not one of the main types of trust models used with PKI?
    • A. 

      Hierarchical

    • B. 

      Bridge

    • C. 

      Mesh

    • D. 

      Star

  • 23. 
    Which of the following is based on the idea of using large integer numbers for the basis of asymmetric encryption?
    • A. 

      ECC

    • B. 

      Diffie-Hellman

    • C. 

      El Gamal

    • D. 

      RSA

  • 24. 
    Which of the following is a 64-bit block cipher?
    • A. 

      IDEA

    • B. 

      CAST

    • C. 

      Blowfish

    • D. 

      RC5

  • 25. 
    In which PKI trust model does a root CA at the top provide all the information to intermediate CAs?
    • A. 

      Hierarchical

    • B. 

      Bridge

    • C. 

      Mesh

    • D. 

      Hybrid

Back to Top Back to top